Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise

被引:0
|
作者
Hautamaki, Jari [1 ]
Kokkonen, Tero [1 ]
Sipola, Tuomo [1 ]
机构
[1] Jamk Univ Appl Sci, Inst Informat Technol, Jyvaskyla, Finland
来源
GOOD PRACTICES AND NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, WORLDCIST 2024 | 2024年 / 987卷
关键词
Cyber Security; Security Information Sharing; Situational Awareness; Threat Information Sharing; Indicator of Compromise; CONSTRUCTIVE RESEARCH; PERSPECTIVES;
D O I
10.1007/978-3-031-60221-4_5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the event of a cyber attack, the efficient production and utilisation of situational information is achieved by sharing information with other actors. In our research, we have discovered how information related to cyber security can be shared online as efficiently as possible between organisations. We used the constructive method to implement a cyber sercurity information sharing network using the Malware Information Sharing Project (MISP). The model was tested in a pilot exercise in fall 2021. The key findings in connection with the pilot showed that it is particularly important for the recipient of information security information how quickly and accurately the information security event is described. In order to help quick reaction, it would also be necessary to implement informal channels, through which security information can be shared easily without structured event descriptions.
引用
收藏
页码:45 / 55
页数:11
相关论文
共 50 条
  • [41] Cyber security as the basis for the national security of Ukraine
    Tarasenko, Oleh
    Mirkovets, Dmytro
    Shevchyshen, Artem
    Nahorniuk-Danyliuk, Oleksandr
    Yermakov, Yurii
    CUESTIONES POLITICAS, 2022, 40 (73): : 583 - 599
  • [42] ARTIFICIAL INTELLIGENCE FOR GOOD AND BAD IN CYBER AND INFORMATION SECURITY
    Kasakliev, Nikolay
    Somova, Elena
    Gocheva, Margarita
    MATHEMATICS AND INFORMATICS, 2024, 67 (01): : 82 - 94
  • [43] An Intelligent Security Assistant for Cyber Security Operations
    Sayan, Carla Maria
    Hariri, Salim
    Ball, George
    2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 375 - 376
  • [44] The Nexus Between Cyber Security and Energy Security
    Nussbaum, Daniel
    Pickl, Stefan
    Dupuy, Arnold
    Nistor, Marian Sorin
    PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), 2016, : 228 - 236
  • [45] An Investigation on Cyber Security Threats and Security Models
    Thakur, Kutub
    Qiu, Meikang
    Gai, Keke
    Ali, Md Liakat
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 307 - 311
  • [46] A bibliometric analysis of cyber security and cyber forensics research
    Sharma, Deepak
    Mittal, Ruchi
    Sekhar, Ravi
    Shah, Pritesh
    Renz, Matthias
    RESULTS IN CONTROL AND OPTIMIZATION, 2023, 10
  • [47] The Impact of Cyber Security issues on Businesses and Governments A framework for implementing a Cyber Security Plan
    Iguer, Hajar
    Medromi, Hicham
    Sayouti, Adil
    Elhasnaoui, Soukaina
    Faris, Sophia
    2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 316 - 321
  • [48] CYBER SECURITY ANALYSIS OF SMART BUILDINGS FROM A CYBER SECURITY ARCHITECTURE POINT OF VIEW
    Sandor, Barnabas
    Rajnai, Zoltan
    INTERDISCIPLINARY DESCRIPTION OF COMPLEX SYSTEMS, 2023, 21 (02) : 141 - 147
  • [49] The "Triptych of Cyber Security": A Classification of Active Cyber Defence
    Dewar, Robert S.
    2014 6TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON 2014), 2014, : 7 - 21
  • [50] A survey on neural networks for (cyber-) security and (cyber-) security of neural networks
    Pawlicki, Marek
    Kozik, Rafal
    Choras, Michal
    NEUROCOMPUTING, 2022, 500 : 1075 - 1087